156-215.81 Dumps

156-215.81 Free Practice Test

CheckPoint 156-215.81: Check Point Certified Security Administrator R81

QUESTION 6

Which two Identity Awareness commands are used to support identity sharing?

Correct Answer: A

QUESTION 7

Log query results can be exported to what file format?

Correct Answer: B

QUESTION 8

Which Threat Prevention profile uses sanitization technology?

Correct Answer: B
Strict Security for Perimeter Profile & Perimeter Profile use sanitization as a technology in Threat prevention profile

QUESTION 9

Which of the following is NOT a tracking log option in R80.x?

Correct Answer: C

QUESTION 10

To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?

Correct Answer: B
Data from malicious attacks are shared between the Threat Prevention Software Blades and help to keep your network safe. For example, the signatures from threats that Threat Emulation identifies are added to the ThreatCloud for use by the other Threat Prevention blades. src
https://infosec.co.il/wp-content/uploads/2020/06/12-GAiA-R80.40-Threat-Prevention.pdf page 28.